CVE-2025-68422

4.3 MEDIUM

📋 TL;DR

CVE-2025-68422 is an improper authorization vulnerability in Kibana that allows authenticated users to bypass permission restrictions via crafted HTTP requests. This enables attackers without 'live queries - read' permission to retrieve live query lists, potentially exposing sensitive system information. Organizations running vulnerable Kibana versions with authenticated user access are affected.

💻 Affected Systems

Products:
  • Kibana
Versions: Versions before 8.19.7, 9.1.7, and 9.2.1
Operating Systems: All platforms running Kibana
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Kibana with authentication enabled and users with varying permission levels.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker escalates to administrative access, accesses sensitive live query data, and potentially pivots to compromise the entire Elastic Stack environment.

🟠

Likely Case

Authenticated low-privilege user accesses live query information they shouldn't see, potentially exposing system monitoring data and query patterns.

🟢

If Mitigated

With proper network segmentation and minimal user permissions, impact is limited to unauthorized viewing of live query lists within the Kibana interface.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if Kibana is exposed to the internet with user accounts.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials can exploit this to bypass intended permission boundaries.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated access and crafted HTTP request.

Exploitation requires valid user credentials and knowledge of the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.19.7, 9.1.7, or 9.2.1

Vendor Advisory: https://discuss.elastic.co/t/kibana-8-19-7-9-1-7-and-9-2-1-security-update-esa-2025-39/384187

Restart Required: Yes

Instructions:

1. Backup Kibana configuration and data. 2. Stop Kibana service. 3. Upgrade to patched version (8.19.7, 9.1.7, or 9.2.1). 4. Restart Kibana service. 5. Verify functionality.

🔧 Temporary Workarounds

Restrict Live Queries Access

all

Remove 'live queries - read' permission from all users who don't absolutely need it.

kibana.yml: xpack.security.authorization.roles: remove live_queries_read from unnecessary roles

Network Access Control

all

Restrict Kibana access to only trusted networks and users.

firewall rules to limit Kibana port (5601) access

🧯 If You Can't Patch

  • Implement strict principle of least privilege for all Kibana user accounts
  • Monitor Kibana access logs for unauthorized live query list retrieval attempts

🔍 How to Verify

Check if Vulnerable:

Check Kibana version via GET /api/status or kibana --version. If version is before 8.19.7, 9.1.7, or 9.2.1, system is vulnerable.

Check Version:

curl -X GET 'http://localhost:5601/api/status' | grep 'number' or kibana --version

Verify Fix Applied:

After patching, verify version shows 8.19.7, 9.1.7, or 9.2.1. Test with low-privilege user attempting to access live queries endpoint.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /api/live_queries endpoints
  • User permission violation logs in Kibana audit logs

Network Indicators:

  • HTTP requests to live queries endpoints from unauthorized user accounts
  • Unusual query patterns to live queries API

SIEM Query:

source="kibana.log" AND ("live_queries" OR "/api/live_queries") AND ("permission denied" OR "authorization failed")

🔗 References

📤 Share & Export